Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
暂无分享,去创建一个
Iraj Sadegh Amiri | Debabrata Samanta | V. Gomathy | Neelamadhab Padhy | M. Sivaram | Vishal Jain | I. Amiri | V. Gomathy | D. Samanta | M. Sivaram | Neelamadhab Padhy | V. Jain
[1] J. S. Shah,et al. Detection and avoidance of malicious node in MANET , 2015, 2015 International Conference on Computer, Communication and Control (IC4).
[2] Muhammad Sheikh Sadi,et al. An Efficient Approach to Select Cluster Head in Wireless Sensor Networks , 2011, J. Commun..
[3] Sudip Misra,et al. Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes , 2016, IEEE Transactions on Network and Service Management.
[4] Qiuwei Yang,et al. Survey of Security Technologies on Wireless Sensor Networks , 2015, J. Sensors.
[5] Ing-Ray Chen,et al. Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems , 2016, IEEE Transactions on Reliability.
[6] P. Latha,et al. Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..
[7] Hussein Al-Bahadili,et al. A fair trust-based malicious node detection and isolation scheme for WSNs , 2017, 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS).
[8] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[9] Zhihua Zhang,et al. Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks , 2017, IEEE Access.
[10] Yang Xiao,et al. Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks , 2013, IEEE Systems Journal.
[11] Deepika Kukreja,et al. Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack , 2018, J. Ambient Intell. Humaniz. Comput..
[12] Donghui Li,et al. A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs , 2018, IEEE Access.
[13] Dilip Sarkar,et al. Detection of Good and Bad Sensor Nodes in the Presence of Malicious Attacks and Its Application to Data Aggregation , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[14] A. Sampathkumar,et al. Gene Selection Using Parallel Lion Optimization Method in Microarray Data for Cancer Classification , 2019, J. Medical Imaging Health Informatics.
[15] Mohammad Ali Jabraeil Jamali,et al. A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks , 2019, J. Ambient Intell. Humaniz. Comput..
[16] Rung Ching Chen,et al. Using ambient intelligence to extend network lifetime in wireless sensor networks , 2016, J. Ambient Intell. Humaniz. Comput..